Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 14

Content of Issue 3
DOI: 10.3217/jucs-014-03
Cryptography in Computer System Security L. Chen, W. Susilo, H. Wang, D.S. Wong, E. Dawson, X. Lai, M. Mambo, A. Miyaji, Y. Mu, D. Pointcheval, B. Preneel, N. Smart 314
Optimistic Fair Exchange in a Multi-user Setting Y. Dodis, P.J. Lee, D.H. Yum 318
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions C. Rechberger, V. Rijmen 347
Parallel Key Exchange I.R. Jeong, D.H. Lee 377
Efficient k-out-of-n Oblivious Transfer Schemes C.-K. Chu, W.-G. Tzeng 397
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols L. Chen, Q. Tang 416
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension G. Yang, D.S. Wong, X. Deng 441
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model Y.H. Hwang, J.K. Liu, S.S. Chow 463
Parallel Formulations of Scalar Multiplication on Koblitz Curves O. Ahmadi, D. Hankerson, F. RodrĂ­guez-HenrĂ­quez 481